Content + Mindful
Content + Mindful
Log In
Lost your password?
Forgotten Password
Cancel
Content + Mindful
  • Home
  • Content Strategy
  • Content Mindfulness
  • About Me
  • Contact
  • Home
  • Content Strategy
  • Content Mindfulness
  • About Me
  • Contact
  • Content Strategy

    Advertising agency culture. The key to solving racism in the industry.

    June 15, 2020

  • Content Strategy

    The deliciously dangerous and euphoric period of a con game.

    June 23, 2020

  • Content Mindfulness

    Headphones. The condoms of content.

    June 9, 2020

  • Content Strategy

    The power of consistent content. What Facebook’s content lawsuit reveals.

    June 2, 2020

  • Content Strategy

    Businesses have a plan for essential workers. Automate the essential part.

    May 19, 2020

  • Content Mindfulness

    Breathe. You do it to live. Now use it to live better.

    May 12, 2020

  • Content Strategy

    Voice experiences will be the future or the end of your business.

    May 5, 2020

  • Content Mindfulness,Content Strategy

    How Can I Help?

    April 23, 2020

  • Content Strategy

    Working from home? Meet your new boss. Structure.

    April 21, 2020

  • Content Strategy

    The B(r)and is breaking up. How music services like Spotify are killing artist brands.

    April 14, 2020

  • Content Mindfulness,Content Strategy

    Don’t fear, embrace uncertainty. Opportunity waits on the other side.

    April 7, 2020

  • Content Strategy

    Call To Action (CTA) tips

    March 31, 2020

  • Small thinking leads to big things

    Content Mindfulness,Content Strategy

    As careers navigate COVID-19, big wins must start with small thinking.

    March 23, 2020

  • Content Mindfulness

    The gods of technology demand a sacrifice.

    March 17, 2020

  • Content Strategy

    When function follows form. And how content strategy is affected.

    March 10, 2020

  • Content Mindfulness

    Hey kids, want some yummy apps?

    March 3, 2020

  • Content Strategy

    What’s the buzz about buzzwords?

    February 25, 2020

  • Content Strategy

    Genderfication. Why women are woefully scarce in tech firms and tech firm leadership.

    February 18, 2020

  • Content Strategy

    The three types of writers.

    February 11, 2020

  • Content Mindfulness

    Can a minimalist buy a $1,400 iPhone?

    February 4, 2020

  • Content Strategy

    What is Natural Language Processing?

    January 28, 2020

  • Content Mindfulness,Uncategorized

    Health. Wealth. Love. Your three everyday happiness investments.

    January 21, 2020

  • Content Strategy

    Working and consulting in tech in 2020. Five predictions.

    January 15, 2020

  • Content Mindfulness,Content Strategy

    Looking back at 2019 to think forward: Hit Rewind Here.

    December 18, 2019

  • Content Mindfulness

    Looking back at 2019 to think forward: Happiness.

    December 13, 2019

  • Content Strategy

    Looking back at 2019 to think forward: Voice Assistants Killing Brands

    December 10, 2019

  • Content Mindfulness

    Looking back, thinking forward: Fight Club’s 20th Anniversary.

    December 5, 2019

  • Content Strategy

    Looking back, thinking forward: Kayfabe

    December 3, 2019

  • Content Mindfulness

    Why I’ve learned to accept grace.

    November 26, 2019

  • Content Strategy

    The needle in a haystack. Why the need for content strategy is universal and timeless.

    November 19, 2019

Content Mindfulness

Hey kids, want some yummy apps?

March 3, 2020 by Brooks Richey

The new Stranger Danger for kids and adults. Your apps.

New rule: Don’t take candy (and apps) from strangers.

Like a stranger with candy, you may focus on the yummy candy or the stated “fun” part of the app you just downloaded. But like a danger stranger’s ulterior motives, we may fail to see the true purpose of the app or offer.

We forget apps can walk and chew gum at the same time.

An app is not a product you purchase for a singular function, like a chair. A chair offers one function: a place to sit (okay, holding up and using it for lion taming is the other).

On the other hand, apps consist of code to handle a variety of tasks. The number of task that are solely determined by the ability and the desire of its creator. It can include code where you can write and run a program to allow the user to play a game or see a picture.

At the same time, other code can run within the same app that quietly performs other tasks that may have nothing to do with delivering that game or picture. Like “borrowing” your personal information.

Essentially some apps can be like a Trojan horse.

Software can act like its namesake horse-looking subterfuge. A wooden horse secretly filled with soldiers that the Greeks used to sneak into the city of Troy and win the war.

Most of us with computers previously experienced this as a type of computer virus that hides within software code. Today’s apps don’t pillage your system as much as infect it. In either case, the story is the same: “what you see in an app is not always what you get.”

Safe from malware. Apparently, not mal intentions.

A recent example. Avast, a company that offers free malware protection (I am a user..but not for much longer) was revealed to be sharing information gathered from the computers it was installed on with third parties.

Through its relationship with a division called Jumpshot, Avast used it’s computer security monitoring services to produce and share its harvested user data with clients including Google, Yelp, Microsoft, McKinsey, Pepsi, Sephora, Home Depot, Condé Nast and Intuit.

Some of Avast’s clients paid to gain access to data from its products that were able to track detailed user behavior, clicks, and movement across websites. Some of the data is reported to include:

  • URLs visited, in what order and when
  • Google searches
  • Lookups of locations and GPS coordinates on Google Maps
  • People visiting companies’ LinkedIn pages
  • YouTube videos
  • Videos users are watching on Facebook and Instagram
  • People visiting porn websites

For those who downloaded the free security software app (like me), do you really feel secure now?

Swipe right while some apps swipe your privacy.

Think you’re just sharing your profile with “HotG” on dating apps like OkCupid, Tinder, and Grindr? You might be surprised.

Sources, including the New York Times, report that these dating services share user information like dating choices and your location to advertising and marketing organizations. Grindr, a gay dating app, sent user-tracking codes and the app’s name to more than a dozen companies, essentially sharing and even disclosing a user’s sexual orientation without the user consent or knowledge.

Hmmm. I’m using an app for one service. I’m being used for another. Where have I seen that before….

Ok, ok, extreme. But you get the idea. You need to do a cost benefit analysis to separate your benefit from using an app from the maker’s benefit and gains.

Getting back to Avast. There is an irony about a company offering an application to protect you while secretly sharing sensitive data with people you don’t know so they can learn more about you without your knowledge or control.

Sometimes they do it even when you exert control.

In fact, reports from researchers revealed that more than 1,000 Android apps harvest your data, even when you expressed for them not to.

Apps that are not given permission by users are still able to leech and capture the data they want via other apps that do have permission to your data. According to the researchers, these apps can gather data from your Wi-Fi connections as well.

How can you tell if apps are working behind your back?

Are you having a deja vu feeling as you start seeing ads on apps or in your browser for items you looked up in a completely different app? You might be witnessing the apps slurping up data from your phone or device.

Sleeping? Data harvesters are just getting to work.

While your data may be collected during the day, it often continues even while your phone is at your bedside and you are asleep.

A very eye-opening example.

A reporter, Geoffrey A. Fowler for the Washington Post, used software to track the activity of apps on his smartphone. He learned that some of the apps he was using were sending data from his phone to business and companies, including some firms he didn’t recognize.

Some excerpts from the article of what he found in his reporting:

“On a recent Monday night, a dozen marketing companies, research firms, and other personal data guzzlers got reports from my iPhone.

At 11.43 pm, a company called Amplitude learned my phone number, e-mail, and exact location.

At 3.58 am, another called Appboy got a digital fingerprint of my phone.

At 6.25 am, a tracker called Demdex received a way to identify my phone and sent back a list of other trackers to pair up with.

And all night long, there was some startling behavior by a household name: Yelp. It was receiving a message that included my IP address.

But we’ve got a giant blind spot when it comes to the data companies probing our phones.

iPhone apps I discovered tracking me by passing information to third parties – just while I was asleep – include Microsoft’s OneDrive, Intuit’s Mint, Nike, Spotify, The Washington Post and IBM’s The Weather Channel. One app, the crime-alert service Citizen, shared personally identifiable information, in violation of its published privacy policy.”

Creepy is an unauthorized attempt for intimacy. This is creepy.

It is a bit disturbing that apps not only ignore or bypass your privacy settings but then robustly share your data on your phone with people you don’t even know.

Why is this no different than someone sneaking through my house when I’m asleep, rifling through my papers and files and then sell that info to a third party? It’s not.

And I’ll just take a moment to remind you, your kids probably have smartphones, too.

Then the next question, why isn’t anyone doing anything about this digital “Danger Stranger?”

Probably because there are clauses in the Terms and Conditions for these apps that make it hard for me or any of you to take significant action.

Steps to help users fight stranger danger.

To Facebook’s credit, it recently introduced a “clear history” button at the top of the page. The new feature will allow users to erase all the off-Facebook data presented. You can also click on each app or website in the list to see how much data they’ve shared and stop them from doing so.

Make no mistake, this visibility can give users greater control over how their data is used. Control that can hurt the financial model Facebook and app partners rely on.

So why offer the service? Executives, off the record, give away the game. They offer such features, not just for the upside of PR, but because they are betting that consumers don’t care enough about access to their data to use it.

What did I do?

I recently downloaded Jumbo, a privacy app for iOS. It is a “privacy assistant” that helps to tell me what happens with data and helps manage my privacy settings across platforms like Google, Facebook and Twitter. You can learn more about Jumbo here.

Something like this is not perfect, but it’s a start. Hopefully the start of more conversation and cynicism about just downloading apps simply because they are offered to us, mostly for free. We must not just think about how the app might satisfy our needs, but what is the true end-game for the app.

The bigger task is for all of us to ask questions about apps before we download them to our phones.

  • facebook
  • twitter
  • google plus
  • pinterest
  • Previous readingWhat’s the buzz about buzzwords?
  • Next reading When function follows form. And how content strategy is affected.
2018. Content and Mindful. All rights reserved.